Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to identified that it was impacted? #4

Open
kerlion opened this issue Jul 4, 2024 · 1 comment
Open

How to identified that it was impacted? #4

kerlion opened this issue Jul 4, 2024 · 1 comment

Comments

@kerlion
Copy link

kerlion commented Jul 4, 2024

I have tested on OpenSSH_8.9p1 which was installed a fem monthes ago with default settings.

But it seems that , it has no impact, why?

send_packet: Resource temporarily unavailable
send_packet: Resource temporarily unavailable
send_packet: Resource temporarily unavailable
Estimated parsing time: 0.000671 seconds

for CentOS 7, it show:
Failed to establish connection, attempt 19996
inet_pton: Success
Failed to establish connection, attempt 19997
inet_pton: Success
Failed to establish connection, attempt 19998
inet_pton: Success
Failed to establish connection, attempt 19999

@dreamingday
Copy link

You can carefully read the principles in regresshion.txt; this vulnerability seems to only affect Debian-based systems.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants